General
-
Target
f2ed2d3f31a52a07eea95932c6cd97cbf6a5c527622f51a139efe941243bc34dN.exe
-
Size
113KB
-
Sample
241129-bg88maxmbw
-
MD5
5f802eb02cdba2f6bca9258d93171520
-
SHA1
392735ffdc077020d45682e928bfb351214c2f66
-
SHA256
f2ed2d3f31a52a07eea95932c6cd97cbf6a5c527622f51a139efe941243bc34d
-
SHA512
0ddb99572ecbedffbf74ed6b9ea8c85b33113b5b16ef0f5d14dcbca67f14ae0b363c85086d5c4041225f6b337ac6dc43fff3464a021396bac1d259be50c9532e
-
SSDEEP
1536:orp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4xtKegoxmOBh73vrn:w5eznsjsguGDFqGx8egoxmO3rvj
Static task
static1
Behavioral task
behavioral1
Sample
f2ed2d3f31a52a07eea95932c6cd97cbf6a5c527622f51a139efe941243bc34dN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f2ed2d3f31a52a07eea95932c6cd97cbf6a5c527622f51a139efe941243bc34dN.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
njrat
0.7d
neuf
doddyfire.linkpc.net:10000
e1a87040f2026369a233f9ae76301b7b
-
reg_key
e1a87040f2026369a233f9ae76301b7b
-
splitter
|'|'|
Targets
-
-
Target
f2ed2d3f31a52a07eea95932c6cd97cbf6a5c527622f51a139efe941243bc34dN.exe
-
Size
113KB
-
MD5
5f802eb02cdba2f6bca9258d93171520
-
SHA1
392735ffdc077020d45682e928bfb351214c2f66
-
SHA256
f2ed2d3f31a52a07eea95932c6cd97cbf6a5c527622f51a139efe941243bc34d
-
SHA512
0ddb99572ecbedffbf74ed6b9ea8c85b33113b5b16ef0f5d14dcbca67f14ae0b363c85086d5c4041225f6b337ac6dc43fff3464a021396bac1d259be50c9532e
-
SSDEEP
1536:orp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4xtKegoxmOBh73vrn:w5eznsjsguGDFqGx8egoxmO3rvj
-
Njrat family
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1